Sciweavers

1661 search results - page 106 / 333
» Distributed Top-K Monitoring
Sort
View
IEEEIA
2009
13 years 8 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
WSC
2004
13 years 11 months ago
Modeling Tool Failures in Semiconductor Fab Simulation
In this research, we investigate how well Weibull, Gamma, and special bimodal distribution are suited as an alternative to the exponential distribution approach in the stochastic ...
Oliver Rose
IPPS
2006
IEEE
14 years 4 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
ICSOC
2005
Springer
14 years 3 months ago
ASTRO: Supporting Composition and Execution of Web Services
Web services are rapidly emerging as the reference paradigm for the interaction and coordination of distributed business processes. In several research papers we have shown how ad...
Michele Trainotti, Marco Pistore, Gaetano Calabres...
CODASPY
2012
12 years 6 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...